TechSoup Healthy - PowerPoint PPT Presentation

1 / 49
About This Presentation
Title:

TechSoup Healthy

Description:

www.techsoup.org/hsc/page7475.cfm. Sponsored by United Way Bay Area. Using ReadyTalk ... Use the chat box or raise your hand to ask a question. ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 50
Provided by: CM29
Category:
Tags: techsoup | healthy

less

Transcript and Presenter's Notes

Title: TechSoup Healthy


1
TechSoup Healthy Secure ComputingTraining for
the Accidental TechieFebruary 6, 2008
Remember to call 866-740-1260 Use access code
6339392 Please have the workbook printed and
ready. Download it herewww.techsoup.org/hsc/page
7475.cfm
Sponsored by United Way Bay Area
2
Using ReadyTalk
  • All lines will be muted.
  • Use the chat box or raise your hand to ask a
    question. When your name is called, unmute your
    phone by pressing 7. To remute press 6.
  • If you lose the internet connection, reconnect
    following the same instructions you followed at
    the start of the training.
  • If you lose the phone connection, re-dial the
    conference phone number and re-join.

3
Webinar Presenters
Volunteers Jennifer Cropper Joe Salrin Yann
Toledano
Kevin Lo
Kami Griffiths
4
Thank you!
5
Participant profile
6
Your technology challenges
  • System Administration, and keeping performance at
    or near optimal level without "wasting" time
    trying to accomplish this.
  • Developing a system that can help us be more
    efficient.
  • Old equipment, old computer knowledge, old world
    thinking.
  • Lack of basic knowledge regarding security and
    maintenance issues for PC users.
  • Not completing routine maintenance defrags, disk
    cleanups, and disk checks.
  • Keeping our cobbled-together systems working and
    coaxing the greatest benefit out of them as we
    can.
  • Keeping up with changes done by different people
    and maintaining 4 computers.
  • Keeping up with changes in technology and
    protecting against security threats.
  • Routine maintenance and virus issues.
  • We have very outdated in software and hardware.

7
Objectives
  • Understand what technology your nonprofit has and
    how to document it.
  • Learn what the crucial security and maintenance
    tasks are and develop a schedule.
  • Learn the importance of data backup and the
    options available.
  • Learn about ways to track technical problems.
  • Understand what software and hardware your
    organization needs.
  • Learn more about TechSoup Stock.

8
Technology Plan
  • Do you have a technology plan?

9
Why have a Technology Plan?
  • Use technology effectively to further your
    mission
  • Purchase the right equipment for your needs
  • Obtain funding and save money
  • Avoid crises
  • Use staff time more effectively

10
Technology Planning Steps
  • Envision
  • Inventory
  • Assess
  • Act

Modeled after TechAtlas www.techatlas.org
11
Technology Plan Envision
  • Envision
  • Inventory
  • Assess
  • Act
  • Team
  • Mission
  • Vision

12
Technology Plan Inventory
  • Envision
  • Inventory
  • Assess
  • Act
  • Hardware software
  • Tools
  • TechAtlas www.techatlas.com
  • Belarc www.belarc.com

13
Technology Plan Assess
  • Envision
  • Inventory
  • Assess
  • Act
  • Technology skills
  • Tool
  • TechAtlas www.techatlas.com

14
Technology Plan Act
  • Envision
  • Inventory
  • Assess
  • Act
  • Plan
  • Budget
  • Staff
  • Fundraise

15
TechAtlas www.techatlas.org
  • Demonstration

16
Taking inventory Windows XP
  • Demonstration

17
Taking inventory Windows 2000
18
Taking inventory Mac OS X
  • Demonstration

19
Inventory Activity
  • Turn to page 4 in the Workbook
  • Complete a hardware inventory on your computer
  • Raise your hand when youre finished

20
Out with the old
  • The zipcode searchable listings for hardware
    donors at www.techsoup.org/recycle/donate
  • Computer Takeback Campaigns List of responsible
    recyclers www.computertakeback.com/the_solutions/
    recyclers_map.cfm
  • Here are some other listings for end-of-life
    electronics recyclers for 5 year old and older
    equipment
  • Electronics Recycling www.electronicsrecycling.ne
    t/search/search.aspx
  • The National Recycling Coalitionwww.electronicsr
    ecycling.net/search/search.aspx
  • The National Safety Councilwww.nsc.org/ehc/epr2/
    recycler.htm
  • The Electronic Industries Alliance listings
    www.eiae.org/
  • International Association of Electronics
    Recyclers (IAER) www.iaer.org/search/iaersearch.c
    fm

21
Questions Comments
  • Click the raise hand button to speak or type in
    the chat box.

22
Know your network
  • Peer-to-Peer
  • Client Server
  • Managed Network

23
Network options
24
Peer-to-Peer
  • Size
  • Security
  • Growth
  • Training
  • Hosting Resources

25
Network options
26
Client Server
  • Optimization
  • Centralization
  • Security
  • Redundancy and Back-up

27
Network options
28
Managed Network
  • Remote Access
  • Virus/Spam Protection
  • Backup and Restore
  • Upgrades

29
What does your network look like?
  • Turn to page 11 of the workbook
  • One a blank sheet of a paper sketch out your
    network.
  • Raise your hand when youre finished

30
Questions Comments
  • Click the raise hand button to speak or type in
    the chat box.

31
10 Minute Break
32
Security common threats
  • Physical theft
  • Virus, spyware, ad-ware, phishing
  • Compromised network
  • Natural disaster

33
Computer virus
  • A computer program that can copy itself and
    infect a computer without permission or knowledge
    of the user.

34
Spy-ware
  • Computer software installed on a computer to
    intercept or take partial control over the user's
    interaction with the computer, without the user's
    informed consent.

35
Spy-ware
  • Computer software installed on a computer to
    intercept or take partial control over the user's
    interaction with the computer, without the user's
    informed consent.

36
Phishing
  • The act of acquiring sensitive information, such
    as usernames, passwords and credit card details,
    by posing as a trustworthy entity through
    electronic communication.

37
Compromised network
  • No firewall
  • Open wireless connection
  • No data backup
  • Weak passwords

38
Natural disaster
  • Fires
  • Earthquakes
  • Hurricanes
  • Flood

39
Your best defense
  • Physical locks
  • Antivirus, anti-spyware, anti-spam
  • Firewall secure internet connection
  • Data backup
  • Training

40
Maintenance Updates
  • Update your operating system and antivirus
    program
  • Weekly maintenance
  • Delete temporary files
  • Monthly maintenance
  • Scan disk cleanup
  • Disk defragmentation
  • Spybot Search Destroyer
  • Adaware
  • Yearly maintenance
  • Delete unused programs
  • Physically clean it

41
Automatic updates XP
  • Demonstration

42
Automatic updates Win2000
43
Automatic updates Win2000
44
Automatic updates Win2000
45
Automatic updates Mac
  • Demonstration

46
Review what weve covered
  • Understand your nonprofits technology
  • Learn how to document what you have
  • Learn about crucial security threats
  • Develop a maintenance schedule

47
Questions Comments
  • Click the raise hand button to speak or type in
    the chat box.

48
Tomorrows agenda
  • Data Back-up
  • Software Recommendations
  • Hardware Recommendations
  • Learn about TechSoup Stock

49
Thank you!
  • See you online tomorrow at 100pm PST
Write a Comment
User Comments (0)
About PowerShow.com